Analysis
-
max time kernel
114s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 02:41
Static task
static1
Behavioral task
behavioral1
Sample
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe
Resource
win10v2004-20230220-en
General
-
Target
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe
-
Size
689KB
-
MD5
37c146a1dac773ac2e17dd982ab5b66f
-
SHA1
fbee4337e2446c21f7d320e8c02964ab9316c335
-
SHA256
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094
-
SHA512
6140831c77fe0c88ed48d16a7a98537492fc7c87bde8a4004a8ff454ceaa00c973816e43040d047363224fafed493f5bcb3cbbdad7f6bf98e60b02567d5a24ad
-
SSDEEP
12288:/Mrey90eGG8XEe8CMUIt3gp0+ye65hLuCq1F7LjpgDRJ6R6v4F5WfigkJ9nA4:dyhGGWEe2HiK7FfaRfyDJA5Wage9A4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
Processes:
pro6990.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6990.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6990.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1808-192-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-191-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-194-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-196-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-198-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-200-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-202-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-204-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-206-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-208-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-210-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-212-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-214-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-216-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-218-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-220-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-222-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-224-0x0000000005FD0000-0x000000000600F000-memory.dmp family_redline behavioral1/memory/1808-292-0x0000000006060000-0x0000000006070000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un120869.exepro6990.exequ2687.exesi386325.exepid process 3240 un120869.exe 4176 pro6990.exe 1808 qu2687.exe 4512 si386325.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro6990.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6990.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exeun120869.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un120869.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un120869.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4168 4176 WerFault.exe pro6990.exe 4516 1808 WerFault.exe qu2687.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro6990.exequ2687.exesi386325.exepid process 4176 pro6990.exe 4176 pro6990.exe 1808 qu2687.exe 1808 qu2687.exe 4512 si386325.exe 4512 si386325.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro6990.exequ2687.exesi386325.exedescription pid process Token: SeDebugPrivilege 4176 pro6990.exe Token: SeDebugPrivilege 1808 qu2687.exe Token: SeDebugPrivilege 4512 si386325.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exeun120869.exedescription pid process target process PID 2584 wrote to memory of 3240 2584 dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe un120869.exe PID 2584 wrote to memory of 3240 2584 dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe un120869.exe PID 2584 wrote to memory of 3240 2584 dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe un120869.exe PID 3240 wrote to memory of 4176 3240 un120869.exe pro6990.exe PID 3240 wrote to memory of 4176 3240 un120869.exe pro6990.exe PID 3240 wrote to memory of 4176 3240 un120869.exe pro6990.exe PID 3240 wrote to memory of 1808 3240 un120869.exe qu2687.exe PID 3240 wrote to memory of 1808 3240 un120869.exe qu2687.exe PID 3240 wrote to memory of 1808 3240 un120869.exe qu2687.exe PID 2584 wrote to memory of 4512 2584 dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe si386325.exe PID 2584 wrote to memory of 4512 2584 dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe si386325.exe PID 2584 wrote to memory of 4512 2584 dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe si386325.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe"C:\Users\Admin\AppData\Local\Temp\dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un120869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un120869.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6990.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6990.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 10844⤵
- Program crash
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2687.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2687.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 13524⤵
- Program crash
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si386325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si386325.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4176 -ip 41761⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1808 -ip 18081⤵PID:1624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD578c6f719effb45ecd7051fa4608b9450
SHA179de126a901e7417587ed4207babde31683eefa3
SHA2560de780ea486456ce79b8340439dcca441ef695b268c51831645b638245aa30d9
SHA512d227486c9b2e94ed2b9a8461dbc0cc6ea2743f42e76d498954a8c135a0d674011735705f2c5ee5a9a6e410d9602bd60481ab5623834b1d09880e5c854a171bdc
-
Filesize
175KB
MD578c6f719effb45ecd7051fa4608b9450
SHA179de126a901e7417587ed4207babde31683eefa3
SHA2560de780ea486456ce79b8340439dcca441ef695b268c51831645b638245aa30d9
SHA512d227486c9b2e94ed2b9a8461dbc0cc6ea2743f42e76d498954a8c135a0d674011735705f2c5ee5a9a6e410d9602bd60481ab5623834b1d09880e5c854a171bdc
-
Filesize
548KB
MD574c5b0729277dcaadc9d9149405ed6da
SHA12795c1e21cac481bdb4793ed8cfc8909a4641ed9
SHA256e3047a572f89116809ce9f9af4c1b4fc3861dcddf349962b250447b18c855407
SHA5126008e1478874f92294cd3c0330ef75adeb8a1397b825ec58f15e9de9e9f9001e3c6d983b9068d1fa9cdaed85750c32b16a65717ddc64641057fa1bb0ad6b3247
-
Filesize
548KB
MD574c5b0729277dcaadc9d9149405ed6da
SHA12795c1e21cac481bdb4793ed8cfc8909a4641ed9
SHA256e3047a572f89116809ce9f9af4c1b4fc3861dcddf349962b250447b18c855407
SHA5126008e1478874f92294cd3c0330ef75adeb8a1397b825ec58f15e9de9e9f9001e3c6d983b9068d1fa9cdaed85750c32b16a65717ddc64641057fa1bb0ad6b3247
-
Filesize
291KB
MD5ab10ccdbac883fa9b4cf5fa96b01f93e
SHA1954e1046398b2cad446f59cac7539508c8dec4f2
SHA2568f6b75077a246075e68cd6cde4347f3a6088c0e40fd1461ef6cf11c5ce02449a
SHA512e2aa3cb50f565a488a1c2476b08ab9e841435805b1b06d40091ca04074998291c9b06ab3843571e3c7ea00ca907d3aa45b376c96f00f415c36a3047b6654181f
-
Filesize
291KB
MD5ab10ccdbac883fa9b4cf5fa96b01f93e
SHA1954e1046398b2cad446f59cac7539508c8dec4f2
SHA2568f6b75077a246075e68cd6cde4347f3a6088c0e40fd1461ef6cf11c5ce02449a
SHA512e2aa3cb50f565a488a1c2476b08ab9e841435805b1b06d40091ca04074998291c9b06ab3843571e3c7ea00ca907d3aa45b376c96f00f415c36a3047b6654181f
-
Filesize
345KB
MD57e439cc76facf80477c17aa7a2efa616
SHA15e50446061142e6fbe3ae3172aa5d96ecc568d19
SHA256187199e06a0f50a01e23745c7002573c4f4fb6dacaec717317239865a1196ae9
SHA5125d14fe4da5b480ca8b537ef7a36cc427419d1246b86e1e929011ecec5e4fccd6bd29fd7401a3f4f365edaf28b4f570639553e3b7a318187e0fe816710c9fb482
-
Filesize
345KB
MD57e439cc76facf80477c17aa7a2efa616
SHA15e50446061142e6fbe3ae3172aa5d96ecc568d19
SHA256187199e06a0f50a01e23745c7002573c4f4fb6dacaec717317239865a1196ae9
SHA5125d14fe4da5b480ca8b537ef7a36cc427419d1246b86e1e929011ecec5e4fccd6bd29fd7401a3f4f365edaf28b4f570639553e3b7a318187e0fe816710c9fb482